إرسال #287775: keerti1924 Online-Book-Store-Website 1.0 1.0 Arbitrary File Uploadالمعلومات

عنوانkeerti1924 Online-Book-Store-Website 1.0 1.0 Arbitrary File Upload
الوصفThe 'product_update.php' script in keerti1924's Online-Book-Store-Website is vulnerable to Arbitrary File Upload, posing a severe security risk. An authenticated admin user can exploit this flaw to upload malicious files, potentially leading to remote code execution or other security breaches. By uploading a crafted PHP file, attackers can execute arbitrary code on the server, compromising the system's integrity. Remediation involves implementing strict input validation and file upload restrictions, allowing only authorized file types and enforcing proper file permissions. Additionally, implementing file upload scanning and validation mechanisms can help detect and prevent the upload of malicious files.
المصدر⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md
المستخدم
 nochizplz (UID 64302)
ارسال25/02/2024 04:41 PM (2 سنوات منذ)
الاعتدال07/03/2024 03:35 PM (11 days later)
الحالةتمت الموافقة
إدخال VulDB256038 [keerti1924 Online-Book-Store-Website 1.0 product_update.php?update=1 update_image تجاوز الصلاحيات]
النقاط20

Do you need the next level of professionalism?

Upgrade your account now!